Searched refs:uid (Results 1 - 25 of 547) sorted by last modified time

1234567891011>>

/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/
H A Dacl_common.kshlib464 function get_user_group #uid
466 typeset uid=$1
469 if [[ -z $uid ]]; then
473 value=$(id $uid)
480 log_fail "Invalid UID (uid)."
/illumos-gate/usr/src/test/zfs-tests/tests/functional/acl/nontrivial/
H A Dzfs_acl_chmod_owner_001_pos.ksh44 # (1) If uid is granted the write_owner permission, then it can only do
45 # chown to its own uid, or a group that they are a member of.
97 typeset uid=$1
100 if [[ -z $uid ]]; then
104 value=$(id $uid)
111 log_fail "Invalid UID (uid)."
/illumos-gate/usr/src/test/zfs-tests/tests/functional/history/
H A Dhistory_common.kshlib100 typeset uid=$(id -u $user)
106 grep "$cmd \[user $uid ($user) on $hname\]" $NEW_HISTORY >/dev/null \
212 typeset is_set lflag dflag dsname gname gid uname uid opt str code tmp
267 uid=$(id -u ${tmp%% *})
269 code="${str}l\$$uid $opt"
278 code="${str}d\$$uid $opt"
/illumos-gate/usr/src/uts/common/c2/
H A Daudit_event.c773 uint32_t uid, gid; local
777 long uid; member in struct:a
781 uid = (uint32_t)uap->uid;
784 au_uwrite(au_to_arg32(2, "new file uid", uid));
794 uint32_t uid, gid, fd; local
801 long uid; member in struct:a
806 uid = (uint32_t)uap->uid;
839 uint32_t uid, gid; local
844 long uid; member in struct:a
863 long uid; member in struct:a
883 uint32_t uid, gid; local
888 long uid; member in struct:a
1511 uid_t uid, ruid; local
2101 uid_t uid, ruid; local
2233 uint32_t uid; local
2236 long uid; member in struct:a
2608 uint32_t uid; local
2611 long uid; member in struct:a
4884 uid_t uid, ruid; local
5019 uid_t uid, ruid; local
5208 uid_t uid, ruid; local
[all...]
H A Daudit_token.c249 au_to_process(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument
266 return (au_to_any_process(data_header, uid, gid, ruid,
271 au_to_subject(uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, argument
287 return (au_to_any_process(data_header, uid, gid, ruid,
294 uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid,
307 value = (int32_t)uid;
293 au_to_any_process(char data_header, uid_t uid, gid_t gid, uid_t ruid, gid_t rgid, pid_t pid, au_id_t auid, au_asid_t asid, const au_tid_addr_t *atid) argument
/illumos-gate/usr/src/uts/common/dtrace/
H A Ddtrace.c7716 * For DTRACE_PRIV_ALL, the uid and zoneid don't matter.
7779 dtrace_match_priv(const dtrace_probe_t *prp, uint32_t priv, uid_t uid, argument
7803 uid != prp->dtpr_provider->dtpv_priv.dtpp_uid) {
7827 uint32_t priv, uid_t uid, zoneid_t zoneid)
7847 if (dtrace_match_priv(prp, priv, uid, zoneid) == 0)
7993 dtrace_match(const dtrace_probekey_t *pkp, uint32_t priv, uid_t uid, argument
8009 dtrace_match_probe(probe, pkp, priv, uid, zoneid) > 0) {
8052 dtrace_match_probe(probe, pkp, priv, uid,
8077 if (dtrace_match_probe(probe, pkp, priv, uid, zoneid) <= 0)
8826 uid_t uid; local
7826 dtrace_match_probe(const dtrace_probe_t *prp, const dtrace_probekey_t *pkp, uint32_t priv, uid_t uid, zoneid_t zoneid) argument
16072 uid_t uid; local
16574 uid_t uid; local
[all...]
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs4_srv_attr.c2039 uid_t uid; local
2056 * side GETATTR when uid to attribute string conversion cannot
2122 error = nfs_idmap_str_uid(&na->owner, &uid, TRUE);
2130 else if (sarg->vap->va_uid != uid)
H A Dnfs4_vnops.c1264 * we are root (no root net access). If the real uid
1265 * is not root, then retry with the real uid instead.
3747 * as the server may be faking mode bits or mapping uid/gid.
4227 * and setgid bits when changing the uid or gid. The
12479 uid_t uid, gid_t gid, int isdir)
12486 error = vs_ace4_to_acet(filled_vsap, vsap, uid, gid, FALSE);
12506 error = vs_ace4_to_aent(filled_vsap, vsap, uid, gid,
12478 nfs4_create_getsecattr_return(vsecattr_t *filled_vsap, vsecattr_t *vsap, uid_t uid, gid_t gid, int isdir) argument
H A Dnfs4_xdr.c764 * owner/group and if so there is no need to call into the uid/gid
765 * mapping code. While the uid/gid interfaces have their own cache
771 uid_t uid; member in struct:ug_cache
806 pug->uid = pug->gid = 0;
1214 vap->va_uid = pug->uid;
1217 uid_t uid; local
1221 error = nfs_idmap_str_uid(&ov, &uid, FALSE);
1238 vap->va_uid = uid;
1241 pug->uid = uid;
1823 uid_t uid; local
[all...]
H A Dnfs_server.c1610 * then it will carry root (uid 0) credentials on it, and
2006 * information. Then map root uid/gid to appropriate uid/gid.
2020 uid_t uid; local
2082 access = nfsauth_access(exi, req, cr, &uid, &gid, &ngids, &gids);
2154 } else if (crgetuid(cr) != uid || crgetgid(cr) != gid) {
2155 if (crsetugid(cr, uid, gid) != 0)
2218 * mapped to uid 0 get all privileges, so setting cr's
2281 uid_t uid; local
2325 access = nfsauth4_access(cs->exi, cs->vp, req, cr, &uid,
[all...]
/illumos-gate/usr/src/uts/common/fs/smbclnt/smbfs/
H A Dsmbfs_vfsops.c519 smi->smi_uid = STRUCT_FGET(args, uid);
/illumos-gate/usr/src/cmd/auditreduce/
H A Dtoken.c528 * ace who adr_u_int32 (uid/gid)
552 * uid adr_int32
566 int32_t uid; local
569 adrm_int32(adr, &uid, 1);
576 if (m_usere == uid)
589 (obj_owner == uid))
599 * uid adr_int32
613 int32_t uid; local
616 adrm_int32(adr, &uid, 1);
623 if (m_usere == uid)
660 int32_t uid; local
839 int32_t uid, gid, cuid, cgid, mode, seq; local
1815 uid_t uid; local
1876 int32_t uid; local
1900 int32_t uid; local
[all...]
/illumos-gate/usr/src/cmd/zdb/
H A Dzdb.c1592 * print uid or gid information.
1613 dump_uidgid(objset_t *os, uint64_t uid, uint64_t gid) argument
1617 uid_idx = FUID_INDEX(uid);
1633 print_idstr(uid, "uid");
1644 uint64_t uid, gid, mode, fsize, parent, links; local
1676 SA_ADD_BULK_ATTR(bulk, idx, sa_attr_table[ZPL_UID], NULL, &uid, 8);
1720 dump_uidgid(os, uid, gid);
/illumos-gate/usr/src/lib/libc/port/
H A Dllib-lc525 int getpw(uid_t uid, char *buf);
529 struct passwd *getpwuid(uid_t uid);
1775 extern int __init_daemon_priv(int, uid_t uid, gid_t gid, ...);
/illumos-gate/usr/src/lib/librestart/common/
H A Dlibrestart.c2043 if (mcp->pwbuf != NULL && mcp->pwd.pw_uid == mcp->uid)
2056 pwdp = getpwuid_r(mcp->uid, &mcp->pwd, mcp->pwbuf,
2089 * ERANGE the uid is too big
2090 * EINVAL the string starts with a digit, but is not a valid uid
2100 uid_t uid; local
2104 uid = strtol(str, &cp, 10);
2106 if (uid == 0 && errno != 0) {
2115 if (uid > UID_MAX)
2118 *uidp = uid;
2219 if (cip->uid
[all...]
H A Dlibrestart.h273 uid_t uid, euid; member in struct:method_context
/illumos-gate/usr/src/lib/libzonecfg/common/
H A Dlibzonecfg.c129 #define DTD_ATTR_UID (const xmlChar *) "uid"
2929 get_detach_dev_entry(const char *name, uid_t uid, gid_t gid, mode_t mode, argument
2945 (void) snprintf(buf, sizeof (buf), "%lu", uid);
2994 * call-back will be passed the name, uid, gid, mode, acl string and the
/illumos-gate/usr/src/uts/common/os/
H A Dcred.c802 crsetugid(cred_t *cr, uid_t uid, gid_t gid) argument
808 if (!VALID_UID(uid, zone) || !VALID_GID(gid, zone))
811 cr->cr_uid = cr->cr_ruid = cr->cr_suid = uid;
1036 * root (no root net access). Check the real uid, if it isn't root
1037 * make that the uid instead and retry the call.
H A Dexec.c571 uid_t uid, gid; local
617 (privflags = execsetid(vp, &vattr, &uid, &gid, &fset,
634 cred->cr_uid = uid;
636 cred->cr_suid = uid;
704 "!uid %d: setuid execution not allowed, "
708 "!uid %d: setuid execution not allowed, "
716 cmn_err(CE_NOTE, "!zone: %s, uid: %d "
721 cmn_err(CE_NOTE, "!zone: %s, uid: %d "
737 * whether we gained any privileges or executed a set-uid executable.
754 * the file just executed was set-uid o
1032 uid_t uid, gid; local
[all...]
H A Dpolicy.c97 * checks for uid 0. The rationale behind these is that many root
905 * uid of owner of vnode
1098 * Are we allowed to retain the set-uid/set-gid bits when
1100 * "issuid" should be true when set-uid; only in that case
1380 * ovap. In certain situations set-uid/set-gid bits need to be removed;
1417 * to add the set-uid bit, if we're not the owner.
1418 * In the specific case of creating a set-uid root
1437 * chown to other uid FILE_CHOWN_SELF
1645 * privilege is not sufficient to get uid 0.
1650 * get the powers of root wrt uid
2556 secpolicy_smbfs_login(const cred_t *cr, uid_t uid) argument
[all...]
H A Dpriv_defs107 In order to write files owned by uid 0 in the absence of an
108 effective uid of 0 ALL privileges are required.
125 Allows a process to create hardlinks to files owned by a uid
126 different from the process' effective uid.
136 permission bits or ACL except for the set-uid and set-gid
154 set-uid 0 file.
195 Additional restrictions apply if the owner of the object has uid 0
196 and the effective uid of the current process is not 0.
204 Additional restrictions apply if the owner of the object has uid 0
205 and the effective uid o
[all...]
H A Dzone.c5875 uid_t uid; local
6263 uid = crgetruid(newcr);
6265 upcount_dec(uid, GLOBAL_ZONEID);
6266 upcount_inc(uid, zoneid);
/illumos-gate/usr/src/uts/common/smbsrv/
H A Dsmb_kproto.h639 uint16_t uid, smb_user_state_t st);
/illumos-gate/usr/src/uts/i86pc/sys/
H A Dacpidev.h88 #define ACPIDEV_PROP_NAME_ACPI_UID "acpi-uid"
93 #define ACPIDEV_PROP_NAME_UID_FORMAT "acpidev-uid-format"
458 * Try to generate meaningful device unit address from uid.
461 extern char *acpidev_generate_unitaddr(char *uid, char **fmts, size_t nfmt,
/illumos-gate/usr/src/boot/sys/sys/
H A Dmount.h271 #define MNT_EXPORTANON 0x0000000000000400ULL /* anon uid mapping for all */
427 uid_t ex_root; /* mapping for root uid */
442 uid_t ex_root; /* mapping for root uid */
608 typedef int vfs_quotactl_t(struct mount *mp, int cmds, uid_t uid, void *arg);

Completed in 753 milliseconds

1234567891011>>